Paul Baecher
Paul Baecher
Bestätigte E-Mail-Adresse bei cs.tu-darmstadt.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The nepenthes platform: An efficient approach to collect malware
P Baecher, M Koetter, T Holz, M Dornseif, F Freiling
Recent Advances in Intrusion Detection, 165-184, 2006
4592006
Know your enemy: Tracking botnets
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project & Research Alliance, 2005
2512005
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
IFIP International Information Security Conference, 56-67, 2011
432011
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
International Conference on the Theory and Application of Cryptology and …, 2013
292013
Puf-based authentication protocols–revisited
H Busch, S Katzenbeisser, P Baecher
International Workshop on Information Security Applications, 296-308, 2009
282009
Captchas: The good, the bad, and the ugly
P Baecher, MGL Fischlin, R Langenberg, M Lützow, D Schröder
Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit, 2010
262010
Massively-parallel simulation of biochemical systems
J Ackermann, P Baecher, T Franzel, M Goesele, K Hamacher
Informatik 2009–Im Focus das Leben, 2009
262009
Know your enemy: Tracking botnets, 2005
P Bacher, T Holz, M Kotter, G WICH-ERSKI
URL http://www. honeynet. org/papers/bots 4, 24-33, 2016
172016
Ideal-cipher (ir) reducibility for blockcipher-based hash functions
P Baecher, P Farshim, M Fischlin, M Stam
Annual International Conference on the Theory and Applications of …, 2013
102013
libemu–X86 shellcode emulation
P Baecher, M Koetter
102012
Random oracle reducibility
P Baecher, M Fischlin
Annual Cryptology Conference, 21-38, 2011
92011
Tracking Botnets: Using honeynets to learn more about Bots
P Bacher, T Holz, M Kotter, G Wicherski
The Honeynet Project and Research Alliance. Retrieved July 23, 2006, 2005
92005
Reset indifferentiability and its consequences
P Baecher, C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2013
82013
Know your Enemy: Tracking Botnets. The Honeynet Project and Research Alliance
P Bacher, T Holz, M Kotter, G Wicherski
Tech. Rep, 2005
72005
The malware collection tool (mwcollect)
P Baecher, T Holz, M Kötter, G Wicherski
72005
libemu, 2009
P Baecher, M Koetter
7
Expedient non-malleability notions for hash functions
P Baecher, M Fischlin, D Schröder
Cryptographers’ Track at the RSA Conference, 268-283, 2011
52011
Know your enemy: Tracking botnets. from the Honeynet Project
P Bacher, T Holz, M Kotter, G Wicherski
March, 2005
52005
Know your enemy: Tracking botnets, May 2005
P Bacher, T Holz, M Kotter, G Wicherski
5
Getting around non-executable stack (and fix)
P Baecher, M Koetter
4
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20